{"version":"1.0","provider_name":"Colombia Inteligente","provider_url":"https:\/\/colombiainteligente.org\/es_co","title":"Implement a Vulnerability Disclosure Policy - Colombia Inteligente","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"pts2G0md0t\"><a href=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/implement-a-vulnerability-disclosure-policy\/\">Implement a Vulnerability Disclosure Policy<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/implement-a-vulnerability-disclosure-policy\/embed\/#?secret=pts2G0md0t\" width=\"600\" height=\"338\" title=\"\u201cImplement a Vulnerability Disclosure Policy\u201d \u2014 Colombia Inteligente\" data-secret=\"pts2G0md0t\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\" data-no-translation-title=\"\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>","thumbnail_url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/02-12-manage_vulnerability.png","thumbnail_width":282,"thumbnail_height":400,"description":"New standards and regulatory change means organisations need to ensure they are prepared to receive and manage vulnerability reports and follow coordinated vulnerability disclosure best practices. This is an important provision because without mechanisms to report, manage and resolve vulnerabilities, the security of consumer IoT products will diminish over time \u2013 and the likelihood of attack or abuse will increase."}